Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity How can geofencing improve an enterprise security strategy? 01 Sep 2015 SearchSecurity Do third-party DNS providers pose security risks? 01 Sep 2015 SearchSecurity Wearables security: Do enterprises need a separate WYOD policy? 31 Aug 2015 SearchSecurity If mobile remote wipe isn't an option, will selective wipe do? 19 Aug 2015 SearchSecurity Can a walled garden approach help secure Web browsers? 17 Aug 2015 SearchSecurity Can a new encryption trick prevent reverse engineering? 17 Aug 2015 SearchSecurity How is a smart sandbox different from traditional sandbox technology? 13 Aug 2015 SearchSecurity How can I mitigate the risks of alternative Android browsers? 13 Aug 2015 SearchSecurity Microsoft Edge security features raise the bar in Web browser safety 10 Aug 2015 SearchSecurity Developing an IAM strategy for third-party vendors 04 Aug 2015 SearchSecurity Is third-party access the next IAM frontier? 03 Aug 2015 SearchSecurity Third-party risk management: Avoid the dangers of weak controls 23 Jul 2015 SearchSecurity Managing third parties with enterprise IAM 23 Jul 2015 SearchSecurity How can an HTTP referer header help maintain user Web privacy? 17 Jul 2015 SearchSecurity Certificate authorities are limited but new TLS versions can help 15 Jul 2015 SearchSecurity Block ciphers: REESSE3+ vs. International Data Encryption Algorithm 15 Jul 2015 SearchSecurity Bloom cookies: Privacy without prohibiting Web personalization? 14 Jul 2015 SearchSecurity Does Peerio offer secure enterprise messaging and file sharing? 13 Jul 2015 SearchSecurity How can we secure enterprise email at home and abroad? 13 Jul 2015 SearchSecurity From SSL and early TLS to TLS 1.2: Creating a PCI DSS 3.1 migration plan 13 Jul 2015 SearchSecurity Browser and device fingerprinting: Undeletable cookies of the future? 10 Jun 2015 SearchSecurity Will Certificate Transparency solve certificate authority trust issues? 08 Jun 2015 SearchSecurity Why are software bundles an enterprise software security issue? 08 Jun 2015 SearchSecurity How can a cross-certificate make Android devices crash? 05 Jun 2015 SearchSecurity After Windows Server 2003 end of life: An emergency action plan 05 Jun 2015 SearchSecurity Is the Boeing Black self-destructing phone enterprise-grade? 05 Jun 2015 SearchSecurity DDoS prevention: The latest means and methods 02 Jun 2015 SearchSecurity Can the Wyvern programming language improve Web app security? 18 May 2015 SearchSecurity Are HTML5 mobile apps an enterprise security concern? 18 May 2015 SearchSecurity Can public key pinning improve Mozilla Firefox security? 15 May 2015 SearchSecurity Is global email an enterprise email security risk? 14 May 2015 SearchSecurity Samsung KNOX security: Does NSA approved equal enterprise approved? 13 May 2015 SearchSecurity Are one-day wonders enterprise Web security risks? 29 Apr 2015 SearchSecurity Are mobile persistent cookies a threat to enterprise data security? 28 Apr 2015 SearchSecurity Will HTTP/2 satisfy the need for speed and enterprise Web security? 28 Apr 2015 SearchSecurity How does public key pinning improve website security? 27 Apr 2015 SearchSecurity Is PGP security still strong or is it time for a new encryption standard? 27 Apr 2015 SearchSecurity Is homomorphic encryption the answer to enterprise encryption issues? 24 Apr 2015 SearchSecurity Creating an end-of-life policy for mobile products in the enterprise 13 Apr 2015 SearchSecurity RASP is latest grasp at secure software delivery 10 Apr 2015 SearchSecurity How will Android encryption by default affect enterprise BYOD? 10 Apr 2015 SearchSecurity How does the Melbourne Shuffle prevent data access pattern recognition? 10 Apr 2015 SearchSecurity Android browser security: How can AOSP browser flaws be fixed? 07 Apr 2015 SearchSecurity What are the Windows Phone 8.1 security improvements? 06 Apr 2015 SearchSecurity How does Pretty Easy Privacy secure online communications? 06 Apr 2015 SearchSecurity How TLS 1.3 updates aim to ensure secure Internet communications 03 Mar 2015 SearchSecurity HTTP/2: Is it the next HTTP? 19 Feb 2015 SearchSecurity What's new with Mac OS X Yosemite security? 19 Feb 2015 SearchSecurity Are security seals a worthwhile website security check? 18 Feb 2015 SearchSecurity Skype vs. Tox: Which is better for secure communications? 17 Feb 2015 SearchSecurity How can jailbroken devices be detected within the enterprise? 13 Feb 2015 SearchSecurity SSL/TLS security: Addressing WinShock, the Schannel vulnerability 06 Feb 2015 SearchSecurity How is Internet authentication changing? 19 Jan 2015 SearchSecurity New authentication technologies can help boost online success 19 Jan 2015 SearchSecurity What the FIDO specification means for multi-factor authentication 19 Jan 2015 SearchSecurity The POODLE vulnerability and its effect on SSL/TLS security 16 Jan 2015 SearchSecurity Detecting backdoors: The Apple backdoor that never was? 07 Jan 2015 SearchSecurity A first look at Windows 10 security features 05 Jan 2015 SearchSecurity How can Microsoft XML vulnerabilities be mitigated? 19 Dec 2014 SearchSecurity Can OAuth 2.0 strengthen authentication? 17 Dec 2014 SearchSecurity How can forged certificates from trusted vendors be stopped? 12 Dec 2014 SearchSecurity Can setting a cache-control header improve application data security? 01 Dec 2014 SearchSecurity Are LibreSSL and BoringSSL safe OpenSSL alternatives? 01 Dec 2014 SearchSecurity SHA-2 algorithm: The how and why of the transition 17 Oct 2014 SearchSecurity Microsoft SQL Server 2008 end of life: When's the time to migrate? 15 Oct 2014 SearchSecurity Can open source cryptography libraries be trusted? 13 Oct 2014 SearchSecurity Security School: Distributed denial-of-service attack defense 29 Aug 2014 SearchSecurity How can the OWASP Top Ten reduce Web application vulnerabilities? 28 Aug 2014 SearchSecurity The key to assigning risk values in an IT security risk assessment 27 Aug 2014 SearchSecurity Can FIPS 140-2 certification improve enterprise mobile security? 19 Aug 2014 SearchSecurity Third-party application security evaluation tools and services 25 Jul 2014 SearchSecurity The best free vulnerability risk assessment tools 24 Jul 2014 SearchSecurity Mobile keyloggers and touchscreen detection attacks 23 Jul 2014 SearchSecurity Building the business case for a formal patch management program 18 Jul 2014 SearchSecurity Mobile keyloggers: Defense measures against mobile keystroke logging 15 Jul 2014 SearchSecurity Security validation for cloud-based applications 13 Jun 2014 SearchSecurity Are malicious mobile apps a mere inconvenience or a real threat? 11 Jun 2014 SearchSecurity How to avoid brand hacking and ensure enterprise social media security 06 May 2014 SearchSecurity How to use the Metasploit Framework to test for new vulnerabilities 30 Apr 2014 SearchSecurity Defense best practices for a man-in-the-middle attack 24 Apr 2014 SearchSecurity Authentication caching: How it reduces enterprise network congestion 28 Mar 2014 SearchSecurity API security: How to ensure secure API use in the enterprise 10 Mar 2014 SearchSecurity HSTS: How HTTP Strict Transport Security enhances application security 27 Feb 2014 SearchSecurity Developing a continuous security monitoring program for 24/7 security 26 Feb 2014 SearchSecurity How Google Chrome Canary improves malware defense, prevents infection 25 Feb 2014 SearchSecurity SHA-1 to SHA-2: The future of SSL and enterprise application security 03 Feb 2014 SearchSecurity Microsoft Office 2003: Staying safe after the security support stops 31 Jan 2014 SearchSecurity Preventing plaintext password problems in Google Chrome 30 Jan 2014 SearchSecurity Smart defense is good offense: Rethink how you use your SIEM product 29 Jan 2014 SearchSecurity The backdoor threat of Trusted Platform Module and Windows 8 14 Jan 2014 SearchSecurity Elliptic curve cryptography: What ECC can do for the enterprise 14 Jan 2014 SearchSecurity What are the top instant messaging security risks facing enterprises? 10 Jan 2014 SearchSecurity SSH security risks: Assessment and remediation planning 09 Jan 2014 SearchSecurity How to identify and secure data egress points to prevent data loss 02 Jan 2014 SearchSecurity Mitigate malicious apps with mobile device security training 22 Nov 2013 SearchSecurity How do different browsers handle SSL certificate revocation? 13 Nov 2013 SearchSecurity Web browser extension security: Mitigating browser plug-in threats 12 Nov 2013 SearchSecurity Open source code reuse: What are the security implications? 08 Nov 2013 SearchSecurity CRM, ERP security best practices: How to secure aging software 05 Nov 2013 SearchSecurity Keys to a successful network-based malware detection deployment 07 Oct 2013 1 2 3 4 5 6 7 8